Modern Information Technologies in the Sphere of Security and Defence http://sit.nuou.org.ua/ <div id="focusAndScope"> <h3>Focus and Scope</h3> <p><strong>On the journal pages the following questions are considered:</strong></p> <p>1. Theoretical foundations and tool means of information technology creation and use in the sphere of security and defence.</p> <p>2. Evaluation criteria and assurance methods of quality, reliability, survivability of information technologies and systems.</p> <p>3. Optimization principles, decision-making models and methods when creating automated systems of different purpose in the sphere of security and defence.</p> <p>4. Researching regularity of information communications construction and developing theoretical foundations of intelligent information technologies construction and implementation for creation of modern collecting, processing, holding control systems in the sphere of security and defence.</p> <p>5. Interactive models of scientific and educational environment development in the sphere of security and defence.</p> <p>6. Holding, developing and transformation of cultural and linguistic heritage in interactive discourse of the context of state information security.</p> <p>7. Globalization, polilogicality and interactivity as philosophical background of information technologies development in the sphere of security and defence.</p> <p>8. Intelligent educational information technologies in the sphere of security and defence. Problems of learning technologies compatibility and interoperability.</p> <p>9. Modern approaches to designing distributed intelligent systems for education and science.</p> <p>10. Modern military theoretical problems.</p> </div> <div id="publicationFrequency"> <h3>Publication Frequency</h3> <p>The journal is published thrice a year:</p> <p>The first issue is April</p> <p>The second number is August</p> <p>The third room is December</p> </div> <div id="openAccessPolicy"> <h3>Open Access Policy</h3> <p>Scientific journal "Modern Information Technologies in the Sphere of Security and Defence" is an open-access. Users can read, download, copy and disseminate content for nonprofit educational and scientifical purposes with the saving of authorship.</p> </div> <div id="custom-0"> <h3>Publication Frequency</h3> <p>The journal is published thrice a year (April, August, December).</p> </div> <div id="custom-1"> <h3>Publication Ethics</h3> <p>The editorial board of the scientific journal <strong>"</strong>Modern Information Technologies in the Sphere of Security and Defence<strong>"</strong> support a certain level of requirements for selection and accepting of the articles submitted by authors. These rules are determined by the scientific fields covered in the journal. They are regulated by the Certificate of State Registration, and quality standards of scientific paper and its presentation adopted in the scientific community.</p> <p>Drawing up the items of the publication ethics policy of the scientific journal <strong>"</strong>Modern Information Technologies in the Sphere of Security and Defence<strong>"</strong> editorial board followed the recommendations of Committee on Publication Ethics (COPE, <a href="http://publicationethics.org/">http://publicationethics.org</a>) and the experience of foreign professional associations and other Ukrainian and foreign research institutions and publishers.</p> <p>A feature of professional scientific community is the acceptance of the moral code which sets the basic rules of behavior and the responsibilities of the scientific community members before each other and in relation to the public. Such a code is defined by the intention to ensure maximum benefit to the professional community and to limit the actions, which could serve the interests of individuals, as well as to ensure an author's intellectual property rights.</p> <p>In addition to the aforesaid editorial board set the list of ethical standards bellow. It should guide persons (editors, authors and reviewers) involved in the publication of research results in the fields of science considered in the journal.</p> <p><strong>Ethical Obligations of Editors of the Journal:</strong></p> <p>1. All submitted materials are carefully selected and reviewed. An editorial board reserves the right to reject an article or return it as requiring improvement. The author is obliged to improve the article according to the remarks of the reviewers and the editorial board.</p> <p>2. An editor should considerate all manuscripts offered for publication without prejudice, evaluating each on its merits without regard to race, religion, nationality, status, or institutional affiliation of the author(s). An editor may take into account relationships of a manuscript under consideration to others previously offered by the same author(s).</p> <p>3. An editor should consider manuscript submitted for publication without delays.</p> <p>4. The whole responsibility for acceptance or rejection of an article rests with the editor. Responsible and reasonable approach to the duty requires that the editor seek advice from reviewers, Doctor of Science of required specialty, as to the quality and reliability of manuscripts submitted for publication. However, manuscripts may be rejected without external review if considered by the Editors to be inappropriate for the journal.</p> <p>5. The editor and members of the editor’s staff should not disclose any information about a manuscript under consideration to anyone other than those from whom professional advice is sought. After a positive decision has been made about a manuscript, it should be published in the journal and in the website of the journal.</p> <p>6. It is acceptable to spread articles published in the journal or quotations over the Internet with precondition of giving references and links to the primary source. Publication and/or distribution of materials from the journal by third parties or organizations in print and electronic media are prohibited.</p> <p>7. According to the international law of electronic media copyright, copying of materials published in electronic journal in full or in part is not allowed without the prior written permission of author(s) and Editors. In case of use of the published materials in context of other documents, references to the primary source are required.</p> <p>8. An editor should respect the intellectual independence of authors.</p> <p>9. Editorial responsibility and authority for any manuscript authored by an editor and submitted to the editor’s journal should be delegated to other qualified person, such as a member of its Editorial Board.</p> <p>10. If an editor is presented with convincing evidence that the main substance or conclusions of a report published in an editor’s journal are erroneous, the editor should facilitate publication of an appropriate report pointing out the error and, if possible, correcting it. The report may be written by the person who discovered the error or by an original author.</p> <p>11. An author may request that the editor not use certain reviewers in consideration of a manuscript. However, the editor may decide to use one or more of these reviewers, if the editor feels their opinions are important in the fair consideration of a manuscript. This might be the case, for example, when a manuscript seriously disagrees with the previous work of a potential reviewer.</p> <p><strong>Ethical Obligations of Authors:</strong></p> <p>1. Main duty of an author is to present an accurate account of the research performed as well as an objective discussion of its significance.</p> <p>2. Whole responsibility for content of articles and for the fact of publication rests with author(s). Editors do not bear responsibility for probable damage caused by publication of a manuscript to authors or third parties. Editors have the right to withdraw the article already published in case somebody's rights or generally accepted norms appear violated. Editors inform author(s) of the article, persons who gave recommendations and representatives of organization, where the research was held, about the fact of withdrawal.</p> <p>3. An author should be aware that journal space is a limited resource and should use it wisely and economically.</p> <p>4. A primary research report should contain sufficient detail and reference to public sources of information to permit the author’s peers to repeat the work. When requested, the authors should make a reasonable effort to provide samples of unusual materials unavailable elsewhere, with appropriate material transfer agreements to restrict the field of use of the materials so as to protect the legitimate interests of the authors.</p> <p>5. An author should cite those publications that have been influential in determining the nature of the reported work and that will guide the reader quickly to the earlier work that is essential for understanding the present investigation. Except in a review, citation of work that will not be referred to in the reported research should be minimized. An author is obligated to perform a literature search to find, and then cite, the original publications that describe closely related work. For critical materials used in the work, proper citation to sources should also be made when these were supplied by a non author.</p> <p>6. Any unusual hazards appearing during an investigation should be clearly identified in a manuscript reporting the work.</p> <p>7. Fragmentation of research reports should be avoided. A scientist who has done extensive work on a system or group of related systems should organize publication so that each report gives a well-rounded account of a particular aspect of the general study.</p> <p>8. In submitting a manuscript for publication, an author should inform the editor of related manuscripts that the author has under editorial consideration or in press. Copies of those manuscripts should be supplied to the editor, and the relationships of such manuscripts to the one submitted should be indicated.</p> <p>9. It is improper for an author to submit manuscripts describing essentially the same research to more than one journal of primary publication, unless it is a resubmission of a manuscript rejected for or withdrawn from publication. It is generally permissible to submit a manuscript for a full paper expanding on a previously published brief preliminary account (a “communication” or “letter”) of the same work. However, at the time of submission, the editor should be made aware of the earlier communication, and the preliminary communication should be cited in the manuscript.</p> <p>10. An author should identify the source of all information quoted or offered, except that which is common knowledge. Information obtained privately, as in conversation, correspondence, or discussion with third parties, should not be used or reported in the author’s work without explicit permission from the investigator with whom the information originated. Information obtained in the course of confidential services, such as refereeing manuscripts or grant applications, should be treated similarly.</p> <p>11. An experimental or theoretical study may sometimes justify criticism, even severe criticism, of the work of another scientist. When appropriate, such criticism may be offered in published papers. However, in no case is personal criticism considered to be appropriate.</p> <p>12. The co-authors of a paper should be all those persons who have made significant scientific contributions to the work reported and who share responsibility and accountability for the results. Other contributions should be indicated in a footnote or an “Acknowledgments” section. An administrative relationship to the investigation does not of itself qualify a person for co-authorship (but occasionally it may be appropriate to acknowledge major administrative assistance). Deceased persons who meet the criterion for inclusion as co-authors should be so included, with a footnote reporting date of death. No fictitious name should be listed as an author or coauthor. The author who submits a manuscript for publication accepts the responsibility of having included as co-authors all persons appropriate and none inappropriate. The submitting author should have sent each living co-author a draft copy of the manuscript and have obtained the co-author’s assent to co-authorship of it.</p> <p>13. The authors should reveal to the editor and to the readers of the journal any potential and/or relevant competing financial or other interest that might be affected by publication of the results contained in the authors’ manuscript. All authors should not have any personal significant financial interest and employment or other relationship with entities that have a financial or other interest which can affect the results described by the manuscript.</p> <p><strong>Ethical Obligations of Reviewers of Manuscripts:</strong></p> <p>1. As the reviewing of manuscripts is an essential step in the publication process, and therefore in the operation of the scientific method, every scientist has an obligation to do a fair share of reviewing.</p> <p>2. A chosen reviewer who feels inadequately qualified to judge the research reported in a manuscript should return it promptly to the editor.</p> <p>3. A reviewer of a manuscript should judge objectively the quality of the manuscript, of its experimental and theoretical work, of its interpretations and its exposition, with due regard to the maintenance of high scientific and literary standards. A reviewer should respect the intellectual independence of the authors.</p> <p>4. A reviewer should be sensitive to the appearance of a conflict of interest when the manuscript under review is closely related to the reviewer’s work in progress or published. If in doubt, the reviewer should return the manuscript promptly without review, advising the editor of the conflict of interest.</p> <p>5. A reviewer should not evaluate a manuscript authored or co-authored by a person with whom the reviewer has a personal or professional connection if the relationship would bias judgment of the manuscript.</p> <p>6. A reviewer should treat a manuscript sent for review as a confidential document. It should neither be shown to nor discussed with others except, in special cases, to persons from whom specific advice may be sought; in that event, the identities of those consulted should be disclosed to the editor.</p> <p>7. Reviewers should explain and support their judgments adequately so that editors and authors may understand the basis of their comments. Any statement that an observation, derivation, or argument had been previously reported should be accompanied by the relevant citation. Unsupported assertions by reviewers (or by authors in rebuttal) are of little value and should be avoided.</p> <p>8. A reviewer should be alert to failure of authors to cite relevant work by other scientists, bearing in mind that complaints that the reviewer’s own research was insufficiently cited may seem self-serving. A reviewer should call to the editor’s attention any substantial similarity between the manuscript under consideration and any published paper and any manuscript submitted concurrently to another journal.</p> <p>9. A reviewer should act promptly, submitting a report in a timely manner.</p> <p>10. Reviewers should not use or disclose unpublished information, arguments, or interpretations contained in a manuscript under consideration, except with the consent of the author. If this information indicates that some of the reviewer’s work is unlikely to be profitable, the reviewer, however, could ethically discontinue the work.</p> </div> <div id="custom-2"> <h3>Indexing</h3> <p><strong>The journal is indexed in the</strong> <strong><span style="text-decoration: underline;">scientometric databases</span>:</strong></p> <ul> <li><a href="https://scholar.google.com.ua/citations?user=35SAfogAAAAJ&amp;hl=uk">Google Academy</a></li> <li><a href="http://journals.indexcopernicus.com/+++++++,p24782666,3.html">Index Copernicus</a></li> <li><a href="http://www.jifactor.org/journal_view.php?journal_id=2295">The Journals Impact Factor</a></li> </ul> <p><strong>The journal is presented in the following <span style="text-decoration: underline;">databases</span>:</strong></p> <ul> <li><a href="http://www.base-search.net/Search/Results?lookfor=Modern+Information+Technologies+in+the+Sphere+of+Security+and+Defence&amp;type=all&amp;oaboost=1&amp;ling=1&amp;name=&amp;thes=&amp;refid=dcresen&amp;newsearch=1">Bielefeld Academic Search Engine</a></li> <li><a href="http://journalseeker.researchbib.com/?action=viewJournalDetails&amp;issn=23117249&amp;uid=r4e09b">Research Bible</a></li> <li><a href="http://www.worldcat.org/search?qt=worldcat_org_all&amp;q=Modern+Information+Technologies+in+the+Sphere+of+Security+and+Defence">WorldCat</a></li> </ul> <p><strong>The journal is added to the following</strong> <strong><span style="text-decoration: underline;">libraries:</span></strong></p> <ul> <li><a href="http://www.irbis-nbuv.gov.ua/cgi-bin/irbis_nbuv/cgiirbis_64.exe?Z21ID=&amp;I21DBN=UJRN&amp;P21DBN=UJRN&amp;S21STN=1&amp;S21REF=10&amp;S21FMT=juu_all&amp;C21COM=S&amp;S21CNR=20&amp;S21P01=0&amp;S21P02=0&amp;S21P03=PREF=&amp;S21COLORTERMS=0&amp;S21STR=sitsbo">Vernadsky National Library of Ukraine</a></li> </ul> </div> <div id="custom-3"> <h3>Peer review process</h3> <p>The editorial board practices double-blind peer review. This process involves the following:</p> <p>- First, the editors consider all manuscripts to assess their compliance with the journal subject matter and requirements.</p> <p>- Following the decision of the editors, the manuscripts submitted are sent to at least two external experts in the corresponding field. The manuscript passes double-blind peer review, neither the authors nor the reviewers know each other.</p> <p>- Reviewers' comments are transmitted to the authors, together with possible recommendations for the manuscript revision. The editor informs the authors, whether the manuscript is adopted without revision or authors are given the opportunity to review the manuscript and submit it again, or the manuscript is rejected.</p> </div> <div id="history"> <h3>Journal History</h3> <p><strong>2008</strong> <span id="result_box" class="short_text" lang="en"><span class="hps">Print</span></span> <span id="result_box" lang="ru"><span class="hps">specialized scientific publications</span></span> "Modern Information Technologies in the Sphere of Security and Defence" was <span id="result_box" class="short_text" lang="en"><span class="hps alt-edited">founded</span></span> in 2008.</p> <p> </p> <p><strong>2009</strong> <span id="result_box" lang="ru"><span class="hps">According to the Resolution of the Presidium of the Supreme Certification Commission of Ukraine issued on October 14, 2009 (№ 1-05/4) the journal was included into the Ukrainian list of specialized scientific publications which are authorized to publish the results of dissertations for doctoral degree in engineering sciences and military sciences</span></span></p> <p><span lang="ru"><span class="hps"> </span></span></p> <p><span lang="ru"><span class="hps"><strong>2014 </strong>According to the Document of the Ministry of Education and Science of Ukraine issued on December 29, 2014 (№ 1528) the journal was included into the Ukrainian list of specialized scientific publications in engineering sciences and military sciences.</span></span></p> </div> en-US <p><span>Authors who publish with this journal agree to the following terms: </span></p><p><span>1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a <a href="http://creativecommons.org/licenses/by-nc-sa/4.0/"><span>Creative Commons Attribution License</span></a> that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal. </span></p><p><span>2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal. </span></p><p><span>3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See <span><a href="http://opcit.eprints.org/oacitation-biblio.html">The Effect of Open Access</a></span>).</span></p><p><span>4. Personal data and metadata contained in articles are available for storage and processing in various databases and information systems, including them in analytical and statistical reports, creating reasonable relationships of scientific </span>, literary and art objects with personal data, etc. on an area which is not limited.</p> sitnuou@ukr.net (Roman Hrozovskyi) sitnuou@ukr.net (Roman Hrozovskyi) Thu, 30 Sep 2021 13:53:23 +0300 OJS 3.2.1.2 http://blogs.law.harvard.edu/tech/rss 60 Analysis of methods of increasing visibility telecommunications networks http://sit.nuou.org.ua/article/view/240152 <p><em>The development of telecommunication technologies, including radio relay and tropospheric technologies, raises the problem of increasing the stability of networks in connection with the constant increase in requirements for the quality of their operation. Particular attention in our time, given the experience of environmental protection, is growing need to improve methods of prevention and neutralization of negative impacts on telecommunications networks, which in our time are constantly improving and occur in forms that previously did not exist. The number of cases of negative effects on telecommunications networks that harm not only the physical structure of the network, but also logical, which, in turn, requires consideration of assessing the increase in survivability not only in terms of structural survivability, but also in terms of software performance of heterogeneous traffic management. Additionally, you need to pay attention to the security of connections and the transmission of information on them.</em></p> <p><em>The purpose of this article is to analyze the most relevant methods and techniques to ensure and increase the required level of survivability and narrow the scope of research to further optimize or find a better combination of methods or create improved methods to improve efficiency in solving problems related to ensuring the required level of telecommunications networks. and systems.</em></p> <p><em>In the study of survivability, it is possible to use a number of different theoretical approaches and, thus, the use of different methods of analysis: game-theoretic, probabilistic, deterministic, graph-analytical. Probabilistic and deterministic approaches are the most developed for technical purposes, and therefore are promising for improvement and optimization.</em></p> Andrii Zinchenko , Mykola Masesov , Ivan Pantas Copyright (c) 2021 Андрій Зінченко, Микола Масесов , Іван Пантась http://sit.nuou.org.ua/article/view/240152 Thu, 30 Sep 2021 00:00:00 +0300 Problems statement of rational distribution of miscellaneous ways of infiormation warfarw of enemy by transport plarform elements of national telecommunication network for ways definition of its radio-electronic suppression http://sit.nuou.org.ua/article/view/237161 <p><em>Interference protection of the communication system is a relevant and important area of research, the methodology for assessing the impact of radio and electromagnetic suppression on it is currently well developed and known. The national telecommunication network as a set of communication systems and networks in the context of a hybrid war against Ukraine needs to improve ways to protect it from the destructive influence of the enemy, which is equipped with the latest radio suppression and electromagnetic. Unprotected national telecommunication network will not be able to perform its main function, namely the circulation (transmission, reception, creation, processing, storage) and protection of national information resources, providing secure electronic communications, providing a range of modern secure information and communication (multiservice) services in the interests of government in peacetime, in a state of emergency and in a special period, and which is a dual-purpose network (system) using part of its resources to provide services, including cyber security, to other consumers. Qualitative development of methods and techniques to ensure noise immunity of national telecommunication network elements is impossible without predicting possible scenarios of enemy action and the noise situation that may arise.</em></p> <p><em>The current moment of time is characterized by fundamental changes in the conditions of application of the transport platform of the national telecommunication network in the conditions of conducting a hybrid war of the Russian Federation against Ukraine. The analysis showed that in case of aggravation of the situation at the front, transition of the enemy to large-scale armed aggression or terrorist acts, the resource of transport platform of the national telecommunication network is one of the primary objects of influence of the latest means of electronic and electromagnetic suppression of units (units) of Russian terrorist forces.</em></p> <p><em>The problem of rational distribution of the resource of inhomogeneous means of electronic warfare of the enemy on the elements of transport platform of the national telecommunication network for further development of methods for determining ways of its electronic suppression and creating a model of electronic situation in hybrid, combat and terrorist actions against Ukraine.</em></p> <p><strong><em>Keywords:</em></strong><em> multicriteria optimization, destructive influence, electronic warfare, electromagnetic influence, transport platform, action scenario, disturbance, terrorist actions, hybrid war.</em></p> Grigorii Tikhonov, Serhii Sholokhov, Bohdan Nikolaienko, Valerii Tiutiunnyk Copyright (c) 2021 Григорій Тіхонов, Сергій Шолохов, Богдан Ніколаєнко , Валерій Тютюнник http://sit.nuou.org.ua/article/view/237161 Thu, 30 Sep 2021 00:00:00 +0300 Methodology for justification of the structure of the expert-training system of military purpose http://sit.nuou.org.ua/article/view/239436 <p><em>The current pace of development of information technology has created the preconditions for the emergence of a wide range of tools for providing educational services using distance learning technologies. This is confirmed by the intensification of the use of distance learning systems in the conditions of sanitary and epidemiological restrictions and the need for acute cost savings. Analysis of existing distance learning systems of higher military educational institutions has shown that their structure is not perfect and requires unification of the process of their construction in order to ensure the effectiveness of military training. The implementation of this process requires the use of theoretical and applied tools to build the structure of the expert-educational system of military purpose in the system of distance learning of higher military educational institutions. The main reason for this fact was the irrational construction of the structure of the expert-educational system of military purpose in the system of distance learning of higher military educational institutions.</em></p> <p><em>Based on this, the purpose of this work is to form a typical scientifically sound structure of the expert-educational system of military purpose of a higher military educational institution to ensure the provision of quality modern educational services using information technology. The following methods are used in the work: analysis - during the study of the peculiarities of the structure of distance learning systems of higher military educational institutions, taking into account the experience of the leading countries of the world; formalization - for a meaningful description of the process of functioning of the distance learning system; taxonomy - for multidimensional comparative analysis of the structures of the distance learning system of a higher military educational institution; synthesis - to form a typical structure of the expert training system for military purposes. A method for determining the appropriate option for building the structure of the expert-educational system of military purpose in the system of distance learning of higher military educational institution, based on the procedures of multidimensional comparative analysis of indicators of the quality of functioning of indicators. Based on the results of the application of the methodology, a standard structure of the expert-educational system of military purpose of the distance learning system of a higher military educational institution was developed and recommendations were made on the organization of the distance learning system of a higher military educational institution. The use of a rational structure of the expert training system for military purposes makes it possible to solve complex and problematic situations in the process of training military specialists in higher military bulk institutions. This fact eliminates the limitations in the practice of building the structure of the expert training system for military purposes and creates a new opportunity to cover a wider range of factors that affect the quality of work. The application of this technique allows the distance learning system of a higher military educational institution to predict the results of joint operation of the respective subsystems of the distance learning system, taking into account their contribution to the overall result.</em></p> Spartak Нohonіants , Evgeny Rudenko Copyright (c) 2021 Спартак Гогонянц , Євген Руденко http://sit.nuou.org.ua/article/view/239436 Thu, 30 Sep 2021 00:00:00 +0300 Comparative analysis of methods of psychological influence on the military servants of the armed forces of Ukraine in the conditions of the lunch operation http://sit.nuou.org.ua/article/view/240377 <p><em>The article presents a comparative analysis of methods of psychological influence on servicemen of the Armed Forces of Ukraine in the conditions of a joint operation using the information infrastructure of both Ukraine and the Russian Federation. The information space is full of destructive information, which is mostly hidden in psychological nature and aims to change the behavior of servicemen of the Armed Forces of Ukraine in a way that will contribute to the military and political goals of the aggressor country.</em></p> <p><em>Assessing the predicted effectiveness of psychological influences in these approaches has a number of assumptions and limitations related to the division of the population between those who received space.</em></p> <p><em>Methods of psychological influence on target audiences have a certain sequence, namel: determining the list of information that will be classified as destructive information; clarification of events that confirm the information processes and the negative consequences of their implementation; determination of categories of control influences (hypothesis construction); comparison of the obtained results on the basis of the approximation experiment; analysis of results that can fully confirm the hypothesis; check the compliance of the results; determination of statistical data on the manifestation of all destructive psychological influences.</em></p> <p><em>The results of the study confirm the dominant role and importance of monitoring the situation in ensuring the state's defense capabilities and its military security, which requires priority development in Ukraine.</em></p> Vitaliy Katsalap, Roman Garmatenko Copyright (c) 2021 Віталій Кацалап, Роман Гарматенко http://sit.nuou.org.ua/article/view/240377 Thu, 30 Sep 2021 00:00:00 +0300 Model of dissemination of information in the implementation of the strategic narrative of the state http://sit.nuou.org.ua/article/view/236817 <p><em>Studying and conducting research on the processes of disseminating and receiving information from the media and information circulating in social networks remains a promising scientific area, both for analysts, marketers and for conducting special information and psychological actions in the interests of using troops (forces).</em></p> <p><em>The analysis of a social network or several networks makes it possible to compose a social connection between users and the content of a social network and to determine promising directions for meeting their interests in information, which is directly used to determine target audiences. This is directly related to the development of the technological process and the process of improving the methods of communication between people, which now cover almost every corner of the globe, it has become especially important to understand the processes of information dissemination.</em></p> <p><em>In the article, the author analyzed the SIR epidemic spread model, which was used to describe the spread of rumors from one user to another, and its modification. Based on the results of the analysis, a model for disseminating information among target audiences was proposed and described in the implementation of the strategic narrative of the state. The logic of the model's functioning is based on the presentation of the target audience of the information channel as the sum of three groups of people, namely: subscribers, active and inactive followers. The model also takes into account the intensity of subscription to a news agent, unsubscribing from him, and allows calculating the probability of reading the news.</em></p> <p><em>With the help of the Melting Asphalt software service, the author visualized the process of information dissemination in accordance with the proposed model.</em></p> Oleksandr Voitko Copyright (c) 2021 Олександр Войтко http://sit.nuou.org.ua/article/view/236817 Thu, 30 Sep 2021 00:00:00 +0300 Analysis of the main threats to the national security of the judicial countries of Ukraine during hybrid aggression in Russia http://sit.nuou.org.ua/article/view/234662 <p><em>The article examines the concept and the essence of threats to the national security of Ukraine's neighboring countries caused by Russia's hybrid aggression. Also analyzes the normative legal acts that determine possible information threats to Ukraine and neighboring countries: Poland, Slovakia, Romania, Moldova, Hungary, Belarus. The main attention is paid to real and potential threats to the national security of the state in the information sphere, namely the attempt to manipulate the public consciousness, in particular by disseminating propaganda messages, false, incomplete or biased information. The article also revues the National Security Strategy of the Russian Federation, which determines the causes of threats to the national security of the state.</em></p> <p><em>Based on the analysis of the results of monitoring of the information space, the main target audience is chosen by the special services of the Russian Federation for the dissemination of propaganda messages. At the same time, the main goals of propaganda, which were disseminated by the special services of the Russian Federation during the anti-terrorist operation. His is still distributed in the conditions of the Joint Forces operation in order to achieve the strategic goals of the aggressor country, namely: discrediting the state on the international stage, losing trust as to reliable economic and political partner; discrediting the military and political leadership of the state, heads of state authorities at all levels among Ukrainian society; destabilization of the internal political situation in the state; reducing the moral and psychological state of the personnel of the Armed Forces of Ukraine; information support of the leadership of the temporarily occupied territories, leaders of illegally created armed groups, terrorist organizations of the so-called "DNR" and "LNR"; demonstration of military power of the Russian Federation.</em></p> <p><em>The peculiarities of confrontation of the national interests of our state are found out according to the results of the analysis of the declared national interests and threats to the national security of the neighboring countries of Ukraine. Among them: ethnic diversity of society, escalation of tension in the zone of territorial interests, aggression of the Russian Federation.</em></p> Oleksandr Levchenko , Dmytro Fedorchuk , Yurii Mikhieiev Copyright (c) 2021 Олександр Левченко , Дмитро Федорчук , Юрій Міхєєв http://sit.nuou.org.ua/article/view/234662 Thu, 30 Sep 2021 00:00:00 +0300 Methods of evaluation of efficiency of implementation of cyber security measures of critical information infrastructure bodies of the body http://sit.nuou.org.ua/article/view/239988 <p>The scientific article substantiates the method of assessing the effectiveness of measures aimed at ensuring the cyber security of critical information infrastructure of organizations. This work is a continuation of the study on the preliminary description of "The Future of the Security Environment 2030", expanding the scientific scope for the implementation of urgent public policy measures to neutralize threats to cybersecurity of organizations. The need for the article is due to the rational choice and application of measures aimed at ensuring the cyber security of information infrastructure facilities of organizations. It is established that in practice it is possible to estimate efficiency of performance of the actions directed on maintenance of cyber security through the following indicators (probabilities): risk of cyber security, cybersecurity, functional operability of system of object of critical information infrastructure, cyberstability. To apply the principle of continuity in the article under the improved cybersecurity ontology, the indicator (probability) of cybersecurity risk is selected. The methodology for assessing the risk of cybersecurity of critical information infrastructure of organizations is based on determining the probability of cyber attacks, as well as the levels of their damage. The methodology includes the following stages: the stage of developing a system of indicators for evaluating the effectiveness of activities; the stage of planning the procedures for collecting initial data to assess the effectiveness of the activities; the stage of calculating the value of the performance indicator; stage of interpretation of the value of the indicator of efficiency of performance of the actions directed on maintenance of cybersecurity of objects of a critical information infrastructure of the organizations. The initial values for the calculation of cybersecurity are obtained based on the results of the audit of critical information infrastructure of organizations. Statistical methods, expert estimates, or elements of decision theory should be used to calculate cyber attack probability values as well as the level of possible damage. The scientific novelty of the study is that for the first time a method of evaluating the effectiveness of cybersecurity measures on the indicator (probability) of cybersecurity risk is proposed, which will complement the methodology of planning cybersecurity measures of critical information infrastructure of organizations.</p> Lesja Kozubtsova , Yuri Khlaponin , Igor Kozubtsov Copyright (c) 2021 Леся Козубцова , Юрій Хлапонін , Ігор Козубцов http://sit.nuou.org.ua/article/view/239988 Thu, 30 Sep 2021 00:00:00 +0300 The mathematical model of manned and unmanned teaming combat formation http://sit.nuou.org.ua/article/view/239303 <p><em>To implement automatic control of joint aviation groups combat formations, it is necessary to create a system of the mathematical models of combat formations functioning stages, as well as means of implementing this system, including control and integration procedures. This problem can be most successfully solved when applying logical-dynamic models and the theory of logical-dynamical systems.</em></p> <p><em>The goal of the article is to create a bank of models as a system of mathematical description of combat formations functioning stages, as a basis of the mathematical model of a manned and unmanned teaming combat formation.</em></p> <p><em>The task of synthesis of logical-dynamic models is to divide the initial model into components of structural states (modes), and the system in each structural state can be considered as independent. Modeling of each of the states consists in combining a number of modes that are characterized by a constant of the aerodynamic characteristics of manned and unmanned aerial vehicles, depending on the data of the variables predicate function. Accordingly, the combat mission model of a joint aviation group of manned and unmanned aircraft is divided into a number of stages. The content of research task provides to use of a complete nonlinear model of flight dynamics without dividing into longitudinal, lateral and vertical motion, with the taken assumptions.</em></p> <p><em>Determination of the relative position of manned and unmanned aerial vehicles in combat formation will allow to describe their joint relative movement, which forms the features of the combat formation control system, and the selected coordinate system relative to the loyal wing aircraft will give advantages in solving the control problem.</em></p> Leonid Artyushin , Anatoliy Lobanov , Volodymyr Herasymenko Copyright (c) 2021 Леонід Артюшин, Анатолій Лобанов , Володимир Герасименко http://sit.nuou.org.ua/article/view/239303 Thu, 30 Sep 2021 00:00:00 +0300